I love IP Tables....

Michael Klinosky mpk2 at enter.net
Sat May 26 13:17:22 UTC 2007


Even tho /some/ of the technical stuff eludes me, I've tried to follow 
this thread.

I set up ssh for myself (I own the machines); I haven't yet actually 
made a connection (probably will this weekend).

I'd like to know what threats exits for ssh - are there webpages that 
discuss this? I *thought* that using an arbitrary port and putting 
'AllowUsers ...' into sshd_config would handle these things (along with 
a password other than 'abcd' :)   ).




More information about the fedora-list mailing list